Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:18
Behavioral task
behavioral1
Sample
d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe
Resource
win7-20240903-en
General
-
Target
d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe
-
Size
172KB
-
MD5
8e219fdd09b5a20d378ec62074eee870
-
SHA1
b1afe8ae694c25f66b6300213deb68f6b4ed20bc
-
SHA256
d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743
-
SHA512
16cf3117b75202ac6a6502e9bebcba3f22b2e15fb870c20321579808e4a6e9053e22e55c904fd8ac044e84736eca59f0e1a8a60a6970c9a32635df0a2cd7bd07
-
SSDEEP
3072:OjkTJNLBgRcuBStYlUIYMYsN5vxMtSp7FmxoaHjqlzpkcFSH00u/DL+E0QG:OjkTRgRSWUIYMrN55Mwp7Fmxizkh00u9
Malware Config
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/1420-0-0x0000000000400000-0x000000000042D000-memory.dmp trickbot_loader32 behavioral1/memory/1420-3-0x0000000000400000-0x000000000042D000-memory.dmp trickbot_loader32 behavioral1/memory/2368-9-0x0000000000400000-0x000000000042D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2872 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 1420 wrote to memory of 2776 1420 d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe 30 PID 3004 wrote to memory of 2368 3004 taskeng.exe 32 PID 3004 wrote to memory of 2368 3004 taskeng.exe 32 PID 3004 wrote to memory of 2368 3004 taskeng.exe 32 PID 3004 wrote to memory of 2368 3004 taskeng.exe 32 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 PID 2368 wrote to memory of 2872 2368 d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe"C:\Users\Admin\AppData\Local\Temp\d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2776
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DC7D4F0C-1751-4474-8725-6037AA31CF9C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\netcloud\d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exeC:\Users\Admin\AppData\Roaming\netcloud\d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\netcloud\d018c779972b843a0e9caf7d92cfb898889cb992d9c228d29709b8ac943d8943P.exe
Filesize172KB
MD58e219fdd09b5a20d378ec62074eee870
SHA1b1afe8ae694c25f66b6300213deb68f6b4ed20bc
SHA256d016c557952b643a0e7caf5d92cfb876667cb792d7c226d27509b6ac943d6743
SHA51216cf3117b75202ac6a6502e9bebcba3f22b2e15fb870c20321579808e4a6e9053e22e55c904fd8ac044e84736eca59f0e1a8a60a6970c9a32635df0a2cd7bd07